Abstract is missing.
- LEDAkem: A Post-quantum Key Encapsulation Mechanism Based on QC-LDPC CodesMarco Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi, Paolo Santini. 3-24 [doi]
- Decoding Linear Codes with High Error Rate and Its Impact for LPN SecurityLeif Both, Alexander May 0001. 25-46 [doi]
- QC-MDPC: A Timing Attack and a CCA2 KEMEdward Eaton, Matthieu Lequesne, Alex Parent, Nicolas Sendrier. 47-76 [doi]
- FPGA-Based Niederreiter Cryptosystem Using Binary Goppa CodesWen Wang, Jakub Szefer, Ruben Niederhagen. 77-98 [doi]
- Attacks on the AJPS Mersenne-Based CryptosystemKoen de Boer, Léo Ducas, Stacey Jeffery, Ronald de Wolf. 101-120 [doi]
- Implementing Joux-Vitse's Crossbred Algorithm for Solving $${\mathcal M\mathcal Q}$$ Systems over 픽_2 on GPUsRuben Niederhagen, Kai-Chun Ning, Bo-Yin Yang. 121-141 [doi]
- Practical Cryptanalysis of a Public-Key Encryption Scheme Based on Non-linear Indeterminate Equations at SAC 2017Keita Xagawa. 142-161 [doi]
- Grafting Trees: A Fault Attack Against the SPHINCS FrameworkLaurent Castelnovi, Ange Martinelli, Thomas Prest. 165-184 [doi]
- Post-quantum Security of the Sponge ConstructionJan Czajkowski, Leon Groot Bruinderink, Andreas Hülsing, Christian Schaffner, Dominique Unruh. 185-204 [doi]
- Putting Wings on SPHINCSStefan Kölbl. 205-226 [doi]
- Computing Isogenies Between Montgomery Curves Using the Action of (0, 0)Joost Renes. 229-247 [doi]
- Faster Isogeny-Based Compressed Key AgreementGustavo Zanon, Marcos A. Simplício Jr., Geovandro C. C. F. Pereira, Javad Doliskani, Paulo S. L. M. Barreto. 248-268 [doi]
- Practical Implementation of Ring-SIS/LWE Based Signature and IBEPauline Bert, Pierre-Alain Fouque, Adeline Roux-Langlois, Mohamed Sabt. 271-291 [doi]
- Progressive Lattice SievingThijs Laarhoven, Artur Mariano. 292-311 [doi]
- A Nonstandard Variant of Learning with Rounding with Polynomial Modulus and Unbounded SamplesHart Montgomery. 312-330 [doi]
- Lattice-Based Signcryption Without Random OraclesShingo Sato, Junji Shikata. 331-351 [doi]
- Rank Analysis of Cubic Multivariate CryptosystemsJohn Baena, Daniel Cabarcas, Daniel E. Escudero, Karan Khathuria, Javier A. Verbel. 355-374 [doi]
- Improved Cryptanalysis of HFEv- via ProjectionJintai Ding, Ray A. Perlner, Albrecht Petzoldt, Daniel Smith-Tone. 375-395 [doi]
- HFERP - A New Multivariate Encryption SchemeYasuhiko Ikematsu, Ray A. Perlner, Daniel Smith-Tone, Tsuyoshi Takagi, Jeremy Vates. 396-416 [doi]
- Post-Quantum Zero-Knowledge Proofs for Accumulators with Applications to Ring Signatures from Symmetric-Key PrimitivesDavid Derler, Sebastian Ramacher, Daniel Slamanig. 419-440 [doi]
- G-Merkle: A Hash-Based Group Signature Scheme from Standard AssumptionsRachid El Bansarkhani, Rafael Misoczki. 441-463 [doi]
- Quantum Collision-Finding in Non-uniform Random FunctionsMarko Balogh, Edward Eaton, Fang Song 0001. 467-486 [doi]
- Asymptotically Faster Quantum Algorithms to Solve Multivariate Quadratic EquationsDaniel J. Bernstein, Bo-Yin Yang. 487-506 [doi]
- Improved Quantum Information Set DecodingElena Kirshanova. 507-527 [doi]